Main menu

Rapid Enforcement Allied Computer Team (REACT) Task Force

The Silicon Valley High Technology Task Force, also known as the Rapid Enforcement Allied Computer Team (REACT), is a partnership of 17 local, state, and federal agencies, with the Santa Clara County District Attorney’s Office designated as the lead agency. The REACT Task Force is one of five in the State of California and authorized under California Penal Code 13848. All Agents of the React Task Force are either California Peace Officers and/or U.S. Federal Agents.

REACT was established in 1997 by the California State Department of Justice, in response to both public and industry concerns over the spread of new types of crime directly tied to our increasingly computer-oriented economy and widespread use of the Internet. High tech companies and industry councils provide specialized training, liaison personnel and internal support for task force investigations.1

Notable Activities

On October 5, 2009, the Rapid Enforcement Allied Computer Team (REACT) received a report of an unknown suspect making a threat via the Internet to attack his school with explosives. The threat stated the following:

“Today at 11:30 est I will attack my school with grenades and other forms of violence. Those bastards will pay. Watch here – cnn.com/live.news.”

The suspect attempted to post this threat in a user’s forum of an online computer game on October 5. The company hosting the forum, located in the Bay Area, intercepted the threat before it was posted. The company then immediately reported this incident to local law enforcement. It, in turn, referred the matter to REACT, which specializes in high-tech crimes. Task Force Agent Matt Broad conducted extensive investigation and traced the posting to a male juvenile living in the area of Rocky Mount, North Carolina. The suspect attended a continuation school for troubled youth. Despite the threat, no attack occurred at the school.

REACT then assisted the Rocky Mount Police Department which continued the investigation in North Carolina. On October 15, the suspect was arrested and his residence was searched via a search warrant. No destructive devices or related materials were located during the search. There were, however, written drawings depicting explosions found in the suspect’s possession. The suspect was detained for making a false report of a destructive device and was later released to the custody of his mother pending a juvenile hearing, scheduled for October 27th, 2009, in North Carolina.2

On April 23, 2010 REACT agents served a search warrant at the home of Gizmodo editor Jason Chen, who was suspected of potentially committing a felony in acquiring a reportedly stolen copy of a prototype version of the next generation Apple iPhone. The REACT task force has been criticized for using a warrant, as a subpoena is required to obtain information from journalists who are conveying information to the public. According to Threat Level blog at Wired.com, “federal Privacy Protection Act prohibits the government from seizing materials from journalists and others who possess material for the purpose of communicating to the public. The government cannot seize material from the journalist even if it’s investigating whether the person who possesses the material committed a crime. Instead, investigators need to obtain a subpoena, which would allow the reporter or media outlet to challenge the request and segregate information that is not relevant to the investigation.” The article also describes the search warrant incident in greater detail:

Chen and his wife discovered the officers when they returned from dinner around 9:45 that evening. According to an account he posted online, Chen noticed his garage door was partly open, and when he tried to open it completely, officers came out and told him they had a warrant to search the premises. The warrant had been signed just hours earlier, at 7:00 p.m., by a San Mateo County Superior Court judge. It allowed the police to search Chen, his residence and any vehicle in his control.

The officers were in the process of cataloging the items they had already taken from the premises and told Chen they had been in his home a “few hours already.” According to California law, a search warrant may be served between 7 a.m. and 10 p.m. unless otherwise authorized.

The officers told Chen he could request reimbursement for the damage to his front door.

Jennifer Granick, civil liberties director for the Electronic Frontier Foundation, said Chen is protected from a warrant by both state and federal laws.

The federal Privacy Protection Act prohibits the government from seizing materials from journalists and others who possess material for the purpose of communicating to the public. The government cannot seize material from the journalist even if it’s investigating whether the person who possesses the material committed a crime.3

Involvement of Private Businesses

A number of private companies serve on a “Steering Committee” which is of unknown relation to the Task Force and its operations. In fact, REACT does not make the members of its steering committee public and only limited examples are known. According to the REACT Task Force’s most recent public report, the Steering Committee is to be “comprised of representatives from participating agencies, local high technology industry, and other interested parties. The steering committee shall, at a minimum, meet quarterly to review task force activities, and provide advice, recommendations, strategic input and direction for task force consideration.”

All publicly known examples of Steering Committee members are private corporations and many of them have interests that are directly affected by the Task Force’s activities. In 2006, REACT broke up a counterfeiting ring that was selling pirated copies of Norton Antivirus, which is produced by steering-committee member Symantec. Likewise, piracy investigations have been undertaken by the REACT Task Force on behalf of Microsoft and Adobe. 4

Following the raid on Gizmodo editor Jason Chen, many have questioned what role may have been played by Apple Inc., which is also on the the REACT Task Force Steering Committee. On April 27, 2010 the Threat Level blog reported that representatives of Apple may have traced the iPhone back to Chen’s original source and confronted the individual at his home.5 This confrontation allegedly occurred prior to the REACT raid at Chen’s home, calling the Task Force’s motives further into question.